shoyo / acoustic-keylogger
Pipeline of a keylogging attack using just an audio signal and unsupervised learning.
☆140Updated last year
Related projects ⓘ
Alternatives and complementary repositories for acoustic-keylogger
- ☆128Updated 2 years ago
- ☆509Updated last year
- NSA Codebreaker Challenge 2021 Write-Ups☆55Updated 2 years ago
- ☆535Updated last year
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆271Updated last year
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆48Updated 4 months ago
- Source to www.draw.io☆99Updated 5 years ago
- Why not run micropython on your EMFI tool?☆500Updated 2 months ago
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆337Updated 5 months ago
- An implementation of TEMPEST en GNU Radio☆560Updated 3 months ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆179Updated 2 years ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆280Updated 2 years ago
- GIF displaying its own MD5 (hashquine)☆76Updated 4 years ago
- ☆121Updated 5 years ago
- ☆55Updated last year
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆221Updated last year
- ☆227Updated last year
- Proof-of-concept of the KRACK attack against Linux and Android☆152Updated 6 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆576Updated this week
- Nmap for Bluetooth Low Energy☆168Updated 5 months ago
- A framework for creating smart cards (ICC-based cards with contacts).☆134Updated 3 months ago
- Implement your own USB device in Python, supported by a hardware peripheral such as Cynthion or GreatFET☆780Updated last week
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 4 years ago
- The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router☆190Updated last month
- A collection of tools for generating models of physical keys for 3D printing☆173Updated 6 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆125Updated 6 years ago
- markdown friendly page for my viewers☆38Updated 3 months ago
- Probabilistic Context Free Grammar (PCFG) password guess generator☆320Updated 3 months ago